This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "2017 BASC Agenda"

From OWASP
Jump to: navigation, search
(agenda grid)
 
(workshop agenda changes)
Line 141: Line 141:
 
| align="center" style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Okemo'''
 
| align="center" style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Okemo'''
 
| align="center" style="width:30%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Monroe'''
 
| align="center" style="width:30%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Monroe'''
| align="center" style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Attitash'''
+
| align="center" style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Cannon'''
| align="center" style="width:30%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" | '''Cannon'''
 
 
|-
 
|-
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 10:00-10:50  
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 10:00-10:50  
 
| style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2017_BASC:Resume_Agenda_Template|Jennifer Stitt }}
 
| style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | {{2017_BASC:Resume_Agenda_Template|Jennifer Stitt }}
 
| rowspan="2" style="width:30%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |
 
| rowspan="2" style="width:30%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |
  {{2017_BASC:Workshop_Agenda_Template|Presentation|AppSec Wars Challenge Session 1|Steve Allor }}
+
  {{2017_BASC:Workshop_Agenda_Template|Presentation|AppSec Wars Challenge|Steve Allor }}
 
| rowspan="2" style="width:10%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |   
 
| rowspan="2" style="width:10%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |   
 
| rowspan="2" style="width:30%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
| rowspan="2" style="width:30%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
Line 155: Line 154:
 
|-
 
|-
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 13:00-13:50
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 13:00-13:50
| rowspan="2" style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
+
| rowspan="4" style="width:30%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px" align="center" |  
{{2017_BASC:Workshop_Agenda_Template|Presentation|AppSec Wars Challenge Session 2|Steve Allor }}
+
{{2017_BASC:Presentaton_Agenda_Template|Workshop|Threat Modeling Workshop|Robert Hurlbut  }}
 
| rowspan="3" style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
| rowspan="3" style="width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" |  
 
{{2017_BASC:Presentaton_Agenda_Template|Workshop|Pen Testing Android Applications Workshop|Roshan Thomas & Anurag Dwivedy }}
 
{{2017_BASC:Presentaton_Agenda_Template|Workshop|Pen Testing Android Applications Workshop|Roshan Thomas & Anurag Dwivedy }}
| rowspan="4" style="width:30%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px" align="center" |
 
{{2017_BASC:Presentaton_Agenda_Template|Workshop|Threat Modeling Workshop|Robert Hurlbut  }}
 
 
|-
 
|-
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 14:00-14:50
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 14:00-14:50
Line 167: Line 164:
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 15:00-15:50
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px" align="center" | 15:00-15:50
 
| rowspan="2" style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px" align="center" | <br/><br/><br/><br/>
 
| rowspan="2" style="width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px" align="center" | <br/><br/><br/><br/>
| rowspan="2" style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px" align="center" | 
 
{{2017_BASC:Workshop_Agenda_Template|Presentation|AppSec Wars Challenge Session 3|Steve Allor }}
 
 
|-
 
|-
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px" align="center" | 16:00-16:50
 
| style="width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px" align="center" | 16:00-16:50

Revision as of 15:10, 12 October 2017

Boston-Banner-468x60.gif
Home | Agenda | Presentations | Workshops | Speakers | Register | Twitter 32.png
Platinum Sponsors

Black Duck Software MIT Lincoln Laboratory Veracode


Gold Sponsors

tCell.io

 

 

Silver Sponsors

Qualys bugcrowd


Sponsorships are available: See Sponsorship Kit
Please help us keep BASC free by viewing and visiting all of our sponsors.




Presentations

OWASP Logo.gif

Presentations
OWASP Boston Application Security Conference · Saturday, October 14, 2017

8:30-9:30 Breakfast and Registration

provided by our Platinum Sponsor
Black Duck Software

09:00-09:50 Opening Keynote

Writing Code to Save the World
Chris Poulin, Booz Allen Hamilton

Capture the Flag
Arena


Vic Solem &
Phil Barrows

MEI Security


DEFENDERS
Jay Peak Room

ATTACKERS
Bretton Woods Room

Command & Control
Cranmore Room

Washington/Jefferson Room Adams Room
10:00-10:50
11:00-11:50
12:00-13:00

Lunch
provided by our Platinum Sponsor
MIT Lincoln Laboratory

13:00-13:50
14:00-14:50
15:00-15:50
16:00-16:50
17:00-17:30

Social Time
provided by our Platinum Sponsor
Veracode

17:30-18:30 Closing Keynote

All About You - The Cybersecurity Professional
Candy Alexander

Raffle

Wrap Up


Workshops & Resume Sessions

OWASP Logo.gif

Workshops & Resume Sessions
OWASP Boston Application Security Conference · Saturday, October 14, 2017

Okemo Monroe Cannon
10:00-10:50

Resume Room
Jennifer Stitt

11:00-11:50



13:00-13:50
14:00-14:50

Resume Room
Jennifer Stitt

15:00-15:50



16:00-16:50


You can find out more about this conference at the 2017 BASC Homepage
or by emailing [email protected]
Twitter 32.png